Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673362
Digvijay Puri, Kshamta Chauhan, P. Chauhan, Anuj Gupta
This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. Many organizations have been forced to undergo significant change as a result of the COVID-19 pandemic, including rethinking key aspects of their business cycles and utilizing innovation to stay up with duties while adhering to a shifting scene of regulations and new techniques. This procedure can offer complete knowledge covering points of interest and after effects which influence society from COVID19, by using data frameworks and innovative viewpoints. The viewpoints by various welcomed subject specialists are examined and cross referenced by internet learning, AI brainpower, data board, social communication, network safety, huge information, block chain, innovation and methodology through the perspective of the current emergency and effect on these particular regions. The viewpoints offers and ideal understanding of the scope of points, distinguishing central questions and proposals for hypothesis and practice by utilizing chest X-ray pictures using ML- approach. In the paper, the use of these ML methods to cope with the COVID-19 pandemic flow situation is a promising aspect, just as the prevention of the Covid infection model is proposed.
{"title":"COVID Detection using X-Ray images through Machine Learning","authors":"Digvijay Puri, Kshamta Chauhan, P. Chauhan, Anuj Gupta","doi":"10.1109/ICTAI53825.2021.9673362","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673362","url":null,"abstract":"This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. Many organizations have been forced to undergo significant change as a result of the COVID-19 pandemic, including rethinking key aspects of their business cycles and utilizing innovation to stay up with duties while adhering to a shifting scene of regulations and new techniques. This procedure can offer complete knowledge covering points of interest and after effects which influence society from COVID19, by using data frameworks and innovative viewpoints. The viewpoints by various welcomed subject specialists are examined and cross referenced by internet learning, AI brainpower, data board, social communication, network safety, huge information, block chain, innovation and methodology through the perspective of the current emergency and effect on these particular regions. The viewpoints offers and ideal understanding of the scope of points, distinguishing central questions and proposals for hypothesis and practice by utilizing chest X-ray pictures using ML- approach. In the paper, the use of these ML methods to cope with the COVID-19 pandemic flow situation is a promising aspect, just as the prevention of the Covid infection model is proposed.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133966154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673342
Omer Faruk Yanik, H. Ilgin
In autonomous robots, the hardware and the algorithms are limited by the power constraints of the robots. Increasing algorithm efficiency can be considered as a way to deal with power constraints. Considering the processing load of Visual SLAM methods, which are frequently used in autonomous robots and become increasingly widespread, there is a need to investigate the effects of methods on power consumption. In this study, a performance comparison of ORB-SLAM2, which is a feature-based Visual SLAM method, DSO, and LDSO, which are direct Visual SLAM methods was conducted. We perform the comparison on ICL-NUIM, KITTI, and EUROC datasets using NVIDIA Jetson TX1 hardware. Central Processor Unit (CPU) usage, Graphics Processor Unit (GPU) power consumption, and total power consumption were taken into account since hardware and power constraints are very important issue for autonomous systems. Results showed that ORB-SLAM2 is the most efficient method for GPU load and power consumption. GPU power consumption and total power consumption are higher than expected for the DSO method compared to CPU load. The computational cost of Loop-Closure is seen clearly when comparing the DSO and LDSO methods.
{"title":"Comparison of Power Consumption of Modern SLAM Methods on Various Datasets","authors":"Omer Faruk Yanik, H. Ilgin","doi":"10.1109/ICTAI53825.2021.9673342","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673342","url":null,"abstract":"In autonomous robots, the hardware and the algorithms are limited by the power constraints of the robots. Increasing algorithm efficiency can be considered as a way to deal with power constraints. Considering the processing load of Visual SLAM methods, which are frequently used in autonomous robots and become increasingly widespread, there is a need to investigate the effects of methods on power consumption. In this study, a performance comparison of ORB-SLAM2, which is a feature-based Visual SLAM method, DSO, and LDSO, which are direct Visual SLAM methods was conducted. We perform the comparison on ICL-NUIM, KITTI, and EUROC datasets using NVIDIA Jetson TX1 hardware. Central Processor Unit (CPU) usage, Graphics Processor Unit (GPU) power consumption, and total power consumption were taken into account since hardware and power constraints are very important issue for autonomous systems. Results showed that ORB-SLAM2 is the most efficient method for GPU load and power consumption. GPU power consumption and total power consumption are higher than expected for the DSO method compared to CPU load. The computational cost of Loop-Closure is seen clearly when comparing the DSO and LDSO methods.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133114708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673458
Avyansh Gupta, Ansh Pachauri, P. Pachauri, S. V. Singh, Prateek Chaturvedi, Smita Sharma
The dream of creating Smart Cities is associated with many desires, aspirations, technological limitations and concerns related to a safe and secure human life. This paper is an effort to assess the desired features in a smart city and explore the available solutions by means of upcoming technologies. The key aspects that are prominent for a smart city: infra, economy and policy, technology, sustainability, and health are enumerated with key desired features. These aspects can be fulfilled only by means of available technology solutions. The paper discusses the role of (IoT, Cloud Computing, Big Data, AI &ML and Block chain technology in developing a solution to fulfil the needs of a smart city. The strength and dependence of the technologies on one another is discussed to take the maximum benefit of these technologies while designing an appropriate solution for the smart city.
{"title":"A review on conglomeration of Technologies for Smart Cities","authors":"Avyansh Gupta, Ansh Pachauri, P. Pachauri, S. V. Singh, Prateek Chaturvedi, Smita Sharma","doi":"10.1109/ICTAI53825.2021.9673458","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673458","url":null,"abstract":"The dream of creating Smart Cities is associated with many desires, aspirations, technological limitations and concerns related to a safe and secure human life. This paper is an effort to assess the desired features in a smart city and explore the available solutions by means of upcoming technologies. The key aspects that are prominent for a smart city: infra, economy and policy, technology, sustainability, and health are enumerated with key desired features. These aspects can be fulfilled only by means of available technology solutions. The paper discusses the role of (IoT, Cloud Computing, Big Data, AI &ML and Block chain technology in developing a solution to fulfil the needs of a smart city. The strength and dependence of the technologies on one another is discussed to take the maximum benefit of these technologies while designing an appropriate solution for the smart city.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123872075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673420
Swati Shivkumar Shriyal, B. Ainapure
Classification of IOT devices is a trending topic nowadays. Gartner predicted that there will be 25 billion Internet of Things (IOT) devices in use. There is an increase in the risk of security breaches for devices connected to the internet, because of the proliferation of smart devices. To identify the malfunction of the devices, it is very important to identify every device connected to the network. There are some basic techniques that were traditionally used to classify the device connected to the network; they are port-based and payload-based. Today machine learning techniques are widely used as it gives more accuracy for identifying devices. The classification of IOT devices is still an immature topic, as many researchers have noted was the classification of network traffic. This article, look at emerging trends to classify IOT devices using various techniques. Also, the performance and accuracy of the various techniques used until now is discussed. This paper highlights the security issues for devices connected to the network. Finally, a discussion on an emerging subject is done, i.e. using Blockchain with IOT to secure communication between different IOT devices.
{"title":"IoT Device Classification Techniques and Traffic Analysis - A Review","authors":"Swati Shivkumar Shriyal, B. Ainapure","doi":"10.1109/ICTAI53825.2021.9673420","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673420","url":null,"abstract":"Classification of IOT devices is a trending topic nowadays. Gartner predicted that there will be 25 billion Internet of Things (IOT) devices in use. There is an increase in the risk of security breaches for devices connected to the internet, because of the proliferation of smart devices. To identify the malfunction of the devices, it is very important to identify every device connected to the network. There are some basic techniques that were traditionally used to classify the device connected to the network; they are port-based and payload-based. Today machine learning techniques are widely used as it gives more accuracy for identifying devices. The classification of IOT devices is still an immature topic, as many researchers have noted was the classification of network traffic. This article, look at emerging trends to classify IOT devices using various techniques. Also, the performance and accuracy of the various techniques used until now is discussed. This paper highlights the security issues for devices connected to the network. Finally, a discussion on an emerging subject is done, i.e. using Blockchain with IOT to secure communication between different IOT devices.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124725540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673410
M. Malik, Rakhi Kamra
In the proposed paper, a novel ANN optimized converter has been projected for running the solar trains. With the rise in plea for making power with conventional energy resources, the storing of energy and connection of the energy storing element with the grid and for off grid are the major tasks encountered now a days. Storing of energy with battery is utmost appropriate method for the conventional energy resources alike solar, wind etc. A bi-directional DC-DC converter provides the two directional power flow for battery charging and discharging. The duty cycle of the converter regulates the charging and discharging which is founded on the charge of the battery and route of the current. Here a new two-directional DC-DC converter is premeditated that will extract the energy from the sun in the day time and later when sun is unavailable the charged batteries will supply the energy to the load with the help of converter in Boost Mode. For the efficient working of the PV Cell MPPT is determined with different algorithms and is tested with different ANN architectures. ANN based controller works with maximum efficiency when MPP is determined and after that the controller works in two modes i.e. Down Mode and Up Mode The earlier one needs extreme of ANN limits for making, training and initiating the ANN based system while the other mode of operation requires ANN based Controller that can be placed in PV system operations. Derivatives of output power and voltage which are obtained from the PV cell are the inputs to the ANN system when solar isolations and environmental temperatures are given inputs to the PV Panel. The projected ANN optimized converter is tested using MATLAB/Simulink model with a case study of locomotives is demonstrated here.
{"title":"A Novel PV based ANN Optimized Converter for off grids Locomotives","authors":"M. Malik, Rakhi Kamra","doi":"10.1109/ICTAI53825.2021.9673410","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673410","url":null,"abstract":"In the proposed paper, a novel ANN optimized converter has been projected for running the solar trains. With the rise in plea for making power with conventional energy resources, the storing of energy and connection of the energy storing element with the grid and for off grid are the major tasks encountered now a days. Storing of energy with battery is utmost appropriate method for the conventional energy resources alike solar, wind etc. A bi-directional DC-DC converter provides the two directional power flow for battery charging and discharging. The duty cycle of the converter regulates the charging and discharging which is founded on the charge of the battery and route of the current. Here a new two-directional DC-DC converter is premeditated that will extract the energy from the sun in the day time and later when sun is unavailable the charged batteries will supply the energy to the load with the help of converter in Boost Mode. For the efficient working of the PV Cell MPPT is determined with different algorithms and is tested with different ANN architectures. ANN based controller works with maximum efficiency when MPP is determined and after that the controller works in two modes i.e. Down Mode and Up Mode The earlier one needs extreme of ANN limits for making, training and initiating the ANN based system while the other mode of operation requires ANN based Controller that can be placed in PV system operations. Derivatives of output power and voltage which are obtained from the PV cell are the inputs to the ANN system when solar isolations and environmental temperatures are given inputs to the PV Panel. The projected ANN optimized converter is tested using MATLAB/Simulink model with a case study of locomotives is demonstrated here.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125031803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673175
Nitin Jain, S. Chauhan
In the current time of web, when user establish the communication with another party and user want to share some secrete documents or information in the presence of third party, user need some technique to secure the data from that third party. To protect their data, users are using many methods and day by day improved versions of these methods are coming. At the same time attackers are using new methods to break these new security methods/techniques. A novel approach of providing security to sender & receiver in protecting the data from attackers has been discussed in this article. The proposed approach converts the basic 5x5 play fair stream cipher into the block cipher. Proposed approach is a two-step symmetric key algorithm. First step takes traditional play fair 5x5 matrix of 26 characters and second step takes 25 matrix of (5x5) size having 625 words. So as to change plain content into cipher content first of all see the plain text pair in the first matrix according the position of these characters replace the words from the second matrix by following all rules of traditional play fair algorithm. At the end, a comparative analysis of strength of proposed algorithm has been done with other algorithms.
{"title":"Novel Approach Transforming Stream Cipher to Block Cipher","authors":"Nitin Jain, S. Chauhan","doi":"10.1109/ICTAI53825.2021.9673175","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673175","url":null,"abstract":"In the current time of web, when user establish the communication with another party and user want to share some secrete documents or information in the presence of third party, user need some technique to secure the data from that third party. To protect their data, users are using many methods and day by day improved versions of these methods are coming. At the same time attackers are using new methods to break these new security methods/techniques. A novel approach of providing security to sender & receiver in protecting the data from attackers has been discussed in this article. The proposed approach converts the basic 5x5 play fair stream cipher into the block cipher. Proposed approach is a two-step symmetric key algorithm. First step takes traditional play fair 5x5 matrix of 26 characters and second step takes 25 matrix of (5x5) size having 625 words. So as to change plain content into cipher content first of all see the plain text pair in the first matrix according the position of these characters replace the words from the second matrix by following all rules of traditional play fair algorithm. At the end, a comparative analysis of strength of proposed algorithm has been done with other algorithms.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673285
Inderpreet Kaur, Yogesh Kumar, A. Sandhu
AI (Artificial Intelligence) technologies help with diagnostic procedures, patient monitoring, drug development, personalised medicine, and global health pandemic prediction. Without explicit programming, machine learning enables the technology to enhance and expand. Moreover, machine learning algorithms may use e-health records to evaluate vast quantities of data, dubbed big-data, for illness detection and prediction. Medical devices are used to continually monitor and record a person’s health condition. In light of recent research, the goal of this study is to investigate the potential advantages of extensive data analytics and machine learning (ML). We looked for articles in the literature using multiple high-quality databases, including Google Scholar, Scopus, Web of science (WoS), Scopus and PubMed. This article covers the ML (machine learning), Big Data, and Blockchain Technology in health-care, population health, and medical surveillance.
人工智能(AI)技术有助于诊断程序、患者监测、药物开发、个性化医疗和全球卫生大流行预测。没有明确的编程,机器学习使技术得以增强和扩展。此外,机器学习算法可以使用电子健康记录来评估大量数据,称为大数据,用于疾病检测和预测。医疗设备用于持续监测和记录一个人的健康状况。根据最近的研究,本研究的目标是调查广泛数据分析和机器学习(ML)的潜在优势。我们使用谷歌Scholar、Scopus、Web of science (WoS)、Scopus和PubMed等多个高质量数据库进行文献检索。本文介绍了医疗保健、人口健康和医疗监测中的ML(机器学习)、大数据和区块链技术。
{"title":"A Comprehensive Survey of AI, Blockchain Technology and Big Data Applications in Medical Field and Global Health","authors":"Inderpreet Kaur, Yogesh Kumar, A. Sandhu","doi":"10.1109/ICTAI53825.2021.9673285","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673285","url":null,"abstract":"AI (Artificial Intelligence) technologies help with diagnostic procedures, patient monitoring, drug development, personalised medicine, and global health pandemic prediction. Without explicit programming, machine learning enables the technology to enhance and expand. Moreover, machine learning algorithms may use e-health records to evaluate vast quantities of data, dubbed big-data, for illness detection and prediction. Medical devices are used to continually monitor and record a person’s health condition. In light of recent research, the goal of this study is to investigate the potential advantages of extensive data analytics and machine learning (ML). We looked for articles in the literature using multiple high-quality databases, including Google Scholar, Scopus, Web of science (WoS), Scopus and PubMed. This article covers the ML (machine learning), Big Data, and Blockchain Technology in health-care, population health, and medical surveillance.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129171900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673169
Sharanjit Kaur, Sarabjeet
In the past years, data mining and machine learning techniques are getting used frequently to obtain predictions and to answer as many questions that may arise from the data. In this paper, customer segmentation approach is described. Customer segmentation has nearly limitless potential as a tool for guiding businesses toward more effective marketing and product development. The methods discussed in this article for customer segmentation is based on clustering algorithms. In order to visualize data and the resulting cluster a visualization tool is also used. Finally, a general latent class model is considered that can handle multiple dependent measures of mixed type.
{"title":"Customer Segmentation Using Clustering Algorithm","authors":"Sharanjit Kaur, Sarabjeet","doi":"10.1109/ICTAI53825.2021.9673169","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673169","url":null,"abstract":"In the past years, data mining and machine learning techniques are getting used frequently to obtain predictions and to answer as many questions that may arise from the data. In this paper, customer segmentation approach is described. Customer segmentation has nearly limitless potential as a tool for guiding businesses toward more effective marketing and product development. The methods discussed in this article for customer segmentation is based on clustering algorithms. In order to visualize data and the resulting cluster a visualization tool is also used. Finally, a general latent class model is considered that can handle multiple dependent measures of mixed type.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673260
Manpreet Kaur, Shikha Gupta
Being the major disruptive technology in current era, Blockchain is becoming the prime choice for researchers and businesses. Consensus layer acts a backbone of any blockchain application; therefore to increase the performance of a blockchain ecosystem one should need to optimize the underlying consensus method. As almost every consensus method implemented in past poses limitations in terms of low scalability, high resource requirements, low decentralization and public-private tradeoff, there is a need to have an effective consensus protocol. Therefore, we presented a literature review of recent consensus protocols to find their applicability in IoT integration in this paper. We also described some future directions based on the literature being analyzed that would intend to serve as an effective guideline for to perform research in order to improve performance of a blockchain system.
{"title":"Blockchain Consensus Protocols: State-of-the-art and Future Directions","authors":"Manpreet Kaur, Shikha Gupta","doi":"10.1109/ICTAI53825.2021.9673260","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673260","url":null,"abstract":"Being the major disruptive technology in current era, Blockchain is becoming the prime choice for researchers and businesses. Consensus layer acts a backbone of any blockchain application; therefore to increase the performance of a blockchain ecosystem one should need to optimize the underlying consensus method. As almost every consensus method implemented in past poses limitations in terms of low scalability, high resource requirements, low decentralization and public-private tradeoff, there is a need to have an effective consensus protocol. Therefore, we presented a literature review of recent consensus protocols to find their applicability in IoT integration in this paper. We also described some future directions based on the literature being analyzed that would intend to serve as an effective guideline for to perform research in order to improve performance of a blockchain system.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673245
J. Pal, Shinjini Ghosh, B. Maji, D. K. Bhattacharya
Physiochemical properties of amino acids has significant role in the study of comparison of protein sequences. In the literature, an arbitrary and random combination of these properties has been considered for protein sequence comparison. In the present paper, comparison of protein sequences is obtained using only five known physical properties of the amino acids. Principal component analysis (PCA) is applied on the numerical values corresponding to these physical properties related to twenty amino acids to reduce their dimensions. As a result, corresponding to each amino acid 20 TP values are obtained. Protein Sequences are represented based on these 20 TP values. Then cumulative sums on these represented sequences are taken to get the non-degenerate representations of each of the protein sequences. Now a new form of descriptor is obtained using generalized form of three moment vectors consisting of first, second and third order moments. Then distance matrices are obtained by using Euclidean distance as the distance measure. Finally phylogenetic tree based on such distance matrices using the UPGMA algorithm are constructed. The proposed method is applied on 9 ND4, 9 ND6, 16 ND5, 12 Baculovirus and also on 24 TF protein sequences. The result obtained by this new method is at par with the biological reference and also comparable with the results obtained earlier on the same species by other methods.
{"title":"A Unique Approach for Comparison of Protein Sequence Using PCA Analysis","authors":"J. Pal, Shinjini Ghosh, B. Maji, D. K. Bhattacharya","doi":"10.1109/ICTAI53825.2021.9673245","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673245","url":null,"abstract":"Physiochemical properties of amino acids has significant role in the study of comparison of protein sequences. In the literature, an arbitrary and random combination of these properties has been considered for protein sequence comparison. In the present paper, comparison of protein sequences is obtained using only five known physical properties of the amino acids. Principal component analysis (PCA) is applied on the numerical values corresponding to these physical properties related to twenty amino acids to reduce their dimensions. As a result, corresponding to each amino acid 20 TP values are obtained. Protein Sequences are represented based on these 20 TP values. Then cumulative sums on these represented sequences are taken to get the non-degenerate representations of each of the protein sequences. Now a new form of descriptor is obtained using generalized form of three moment vectors consisting of first, second and third order moments. Then distance matrices are obtained by using Euclidean distance as the distance measure. Finally phylogenetic tree based on such distance matrices using the UPGMA algorithm are constructed. The proposed method is applied on 9 ND4, 9 ND6, 16 ND5, 12 Baculovirus and also on 24 TF protein sequences. The result obtained by this new method is at par with the biological reference and also comparable with the results obtained earlier on the same species by other methods.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127588610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}